【多选题】
___0145.铸造生产在( )工序中会散发大量的热量。
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【多选题】
___0146.冲压(剪)作业应有完善的安全措施。下列安全措施中,属于冲压(剪)作业的有( )。
A. 应用真空吸盘专用工具代替手工操作
B. 通过改进模具以减少危险面积
C. 安装黄颜色闪烁信号灯
D. 安装拉手式安全装置
【多选题】
___0147.在无法通过设计到达本质安全时,为了消除危险,应补充设计安全装置。设计安全装置时必须考虑的因素有( )。
A. 有足够的强度、刚度和耐久性
B. 不能影响机器运行的可靠性
C. 一律用金属材料制作
D. 一律用绝缘材料制作
【多选题】
___0148.冲压设备的安全防护可采用( )等安全装置。
A. 双手按钮式操作系统
B. 红外光电保护装置
C. 脚踏式控制系统
D. 固定式防护罩
【多选题】
___0149.电流对人体损伤的程度与( )、人体的健康状况等因素有关。
A. 电流的频率
B. 电流持续时间
C. 电流种类
D. 电流途径
【多选题】
___0150.压缩机进、出口应设( )装置。
A. 低压报警
B. 高压报警
C. 低压越限停机
D. 高压越限停机
【多选题】
___0151.《手持式电动工具的管理、使用、检查和维修安全技术规程》(GB/T 3787—2006)规定,经定期检查合格的手持电动工具,应在工具的适当部位,粘贴检查“合格”标识 ,其标识至少包括( )。
A. 工具编号
B. 检查方法
C. 检查人员姓名或标记
D. 检查单位名称或标记
【多选题】
___0152.安全带中可以更换的系带应有( )等永久标记。
A. 产品名称及型号
B. 制造厂名
C. 穿戴方法
D. 生产厂商的名称
【多选题】
___0153.普通安全帽适用于大部分工作场所,包括( )等。
A. 交通运输
B. 建设工地
C. 工厂
D. 办公室
【多选题】
___0154.压力管道的安全泄放装置包括( )。
A. 安全阀
B. 紧急切断阀
C. 爆破片装置
D. 补偿器
【多选题】
___0155.( )应选用爆破片装置。
A. 压力可能迅速上升的场合
B. 不需要较大的泄放面积
C. 含有颗粒、易沉淀、易结晶、易聚合、黏度大的介质
D. 不允许有泄漏的场合
【多选题】
___0156.( )属于低压作业安全用具。
A. 绝缘夹钳
B. 验电笔
C. 绝缘靴
D. 高压绝缘拉杆
【多选题】
___0157.( )和拆除临时用电设备和线路,必须由电工完成,并应有人监护。
【多选题】
___0158.临时用电工程定期检查应按( )工程进行,对安全隐患必须及时处理,并应履行复查验收手续。
【多选题】
___0159.同一楼层的构配件和加固件拆除应按( )的顺序进行,最后拆除连墙件。
A. 先下后上
B. 先上后下
C. 先外后里
D. 先里后外
【多选题】
___0160.建筑火灾中烟气流动的影响因素包括( )方面。
A. 防火分区
B. 烟筒效应
C. 防烟分区
D. 通风系统风机的影响
【多选题】
___0161.建筑施工安全防护设施的验收,应具备的资料包括( )。
A. 施工组织设计
B. 成本核算表
C. 安全防护设施验收记录
D. 防护设施设计有关验算数据
【多选题】
___0162.电气设备现场周围不得存放( )。
A. 作业工具
B. 易燃易爆物
C. 污源
D. 腐蚀介质
【多选题】
___0163.下列( )场所严禁采用全隐框玻璃幕墙。
A. 交通枢纽
B. 公共文化体育设施
C. 人员密集的商业中心
D. 临近道路
【多选题】
___0164.玻璃幕墙宜采用( )。
A. 普通玻璃
B. 夹层玻璃
C. 均质钢化玻璃
D. 超白玻璃
【多选题】
___0165.储罐区、厂区边缘及人流较少的地段,可采用( )道路。
A. 城市型
B. 公路型
C. 混合型
D. 街道型
【多选题】
___0166.施工现场的临时用电电力系统严禁利用大地做( )。
【多选题】
___0167.《施工现场临时用电安全技术规范》(JGJ 46—2005)规定,电焊机械应放置在( )的地方。
A. 潮湿
B. 防雨
C. 干燥
D. 通风良好
【多选题】
___0168.《施工现场临时用电安全技术规范》(JGJ 46—2005)规定,在潮湿场所或金属构架上操作时,必须选用( )手持式电动工具。
A. Ⅰ类
B. Ⅱ类
C. 由安全隔离变压器供电的Ⅲ类
D. Ⅳ类
【多选题】
___0169.电缆线路应采用( )。
A. 沿地面明设
B. 埋地敷设
C. 架空敷设
D. 沿墙面底部明设
【多选题】
___0170.埋地电缆的接头应设在地面上的接线盒内,接线盒应能( )。
A. 防静电
B. 防水
C. 防尘
D. 防机械损伤
【多选题】
___0171.埋地电缆的接头应设在地面上的接线盒内,接线盒应远离( )场所。
【多选题】
___0172.供电系统( )应与施工现场原有供用电系统保持一致。
A. 接地型式
B. 接地方法
C. 接地电阻
D. 阻值
【多选题】
___0173.施工现场发电机组周围( )。
A. 不得有电线
B. 不得有明火
C. 不得存放易燃物
D. 不得存放易爆物
【多选题】
___0174.施工现场移动式发电机的使用应( )。
A. 发电机应固定牢固
B. 发电机金属外壳和拖车应有可靠的接地措施
C. 发电机应随车配备消防灭火器材
D. 发电机上部可无防雨棚
【多选题】
___0175.施工现场配电线路不应( )。
A. 跨越在建工程
B. 避开河道
C. 跨越脚手架
D. 穿过临时建筑物
【多选题】
___0176.施工单位应对电动施工机具的( )人员进行安全技术教育和培训。
【多选题】
___0177.电动工具应及时切断电源的情况包括( )。
A. 使用完毕
B. 暂停工作
C. 遇突然停电
D. 正常作业
【多选题】
___0178.电焊机应放置在( )的地方。
A. 防雨
B. 潮湿
C. 干燥
D. 通风良好
【多选题】
___0179.照明灯具应根据施工现场环境条件设计并应选用( )灯具。
A. 普通型
B. 防水型
C. 防尘型
D. 防爆型
【多选题】
___0180.在易燃、易爆区域内进行用电设备( )工作时,必须( )电源,严禁带电作业。
A. 检修;断开
B. 检修;闭合
C. 更换;断开
D. 更换;闭合
【多选题】
___0181.施工现场配置的施工用( )管道,应在其始端、末端、分支处以及直线段每隔50m处安装防静电接地装置。
【多选题】
___0182.供用电设施的( ),应按有关规定配备安全工器具及防护设施,并( )检验。
A. 运行;定期
B. 运行;不定期
C. 维护;定期
D. 维护;不定期
【多选题】
___0183.施工现场室外供用电设施除经常维护外,遇大风、暴雨等恶劣天气时,应加强( )。
【多选题】
___0184.在建筑施工中,高处作业可分为( )三大类。
A. 临边作业
B. 洞口作业
C. 梯架作业
D. 独立悬空作业
【多选题】
___0185.建设工程施工前,施工单位负责项目管理的技术人员应当对有关安全施工的技术要求向( )作出详细说明,并由双方签字确认。
A. 项目负责人
B. 施工单位安全员
C. 作业班组
D. 作业人员
推荐试题
【单选题】
Which IPS detection method examines network traffic for preconfigured patterns?___
A. signature-based detection
B. honey-pot detection
C. anomaly-based detection
D. policy-based detection
【单选题】
What is an advantage of split tunneling ?___
A. It allows users with a VpN connection to a corporate network to access the internet with sending traffic across the cor porate network.
B. It allows users with a vpn connection to a corporate network to access the internet by using the vPN for security.
C. It protects traffic on the private network from users on the public network
D. It enables the VPN server to filter traffic more efficiently
【单选题】
Which IDS/IPS state misidentifies acceptable behavior as an attack ?___
A. false negative
B. true positive NEKA G
C. true negative
D. false positive
【单选题】
What is the maximum num ber of methods that a single method list can contain?___
【单选题】
Which command enables authentication at the oSPFv2 routing process level?___
A. ip ospf authentication message-digest
B. area 0 authentication message-digest
C. ip ospf message-digest-key 1 mds Cisco
D. area 0 authentication ipsec spi 500 md5 1234567890ABCDEF1234567890ABCDEF
【单选题】
Which type of firewall monitors a nd protects a specific system?___
A. firewall
B. application firewall
C. stateless firewall wvp
D. personal firewall
【单选题】
On an ASA, which maps are used to identify traffic?___
A. Route maps
B. Policy maps
C. Class maps
D. Service maps
【单选题】
Which type of social engineering attack targets top executives?___
A. whaling
B. vishin
C. spear phishing ng
D. baiting
【单选题】
What is the minimum Cisco lOS version that supports zone-based firewalls?___
A. 12.1T
B. 15.1
C. 15.0
D. 124
【单选题】
In which type of attack does an attacker overwrite an entry in the CAM table to divert traffic destined to a legitimate host?___
A. DHCP spoofing
B. ARP spoofing
C. CAM table overflow
D. MAC spoofing
【多选题】
Which two attack types can be prevented with the impleme ntation of a Cisco IPS solution?___
A. DDos
B. man-in-the-middle
C. worms
D. ARP spoofing
E. VLAN hopping
【多选题】
choose four___
A. DHCP snooping ——————————blocks DHCP messages
B. Dynamic ARP inspection——————verifies IP-to-MAC traffic on untrusted ports
C. IP sources guard ——————————provides layer 2 interface security with ports ACLs
D. Port security————————————mitigates MAC-address spoofing at the access interface
【多选题】
choose four___
A. Step1————————run the system setup wizard
B. Step2————————add an authentication realm
C. Step3————————configure identity management
D. Step4————————configure directory group
【多选题】
What are two advanced features of the Cisco AMp solution for endpoints ___
A. contemplation
B. foresight
C. sandboxing
D. reputation
E. reflection
【多选题】
Which two characteristics of RADIUS are true?___
A. It encrypts only the password between user and server.
B. It uses TCP ports 1812/1813
C. It uses UDP ports 1812/1813.
D. It uses UDP port 49
E. It uses TCP port 49
【多选题】
What are two challenges of using a network-based IPS? ___
A. It is unable to determine whether a detected attack was successful
B. It requires additional storage and proce ssor capacity on syslog servers
C. As the network expands, it requires you to add more sensors.
D. It is unable to detect attacks across the entire network
E. It must support multiple operating systems.
【多选题】
What are two default be haviors of the traffic on a zone-based firewall?___
A. Traffic within the self -zone uses an im plicit deny all.
B. All traffic between zones is implicitly blocked
C. Communication is allowed between interfadAss that are members of the same zone
D. Communication is blocked between interfaces that are members of the same zone
E. The CBAC rules that are configured on router interfaces apply to zone interfaces
【多选题】
Which two advantages does the on-premise model for MDM deployment have over the cloud-based model?___
A. The on-premise model is easier and faster to de ploy than the cloud-based model
B. The on-premise model is more scalable than the cloud-based model
C. The on-premise model is generally less expensive than the cloud-based model
D. The on-premise model generally has less latency than the cloud- based model.
E. The on-premise model provides more control of the MDM solution than the cloud
【多选题】
Which two actions can an end usts take to manage a lost or stolen device in Cisco ISE? ___
A. Activate Cisco ISE End point Protection Services to quarantine the device.
B. Add the mac address of the device to a list of blacklisted devices
C. Force the device to be locked with a PIN
D. Request revocation of the digital certificate of the device.
E. Reinstate a device that the user previously marked as lost or stolen
【多选题】
Which two problems can arise when a proxy firewall serves as the gateway between networks?___
A. It can prevent content caching
B. It can limit application support
C. It is unable to prevent direct connections to other networks
D. It can cause reduced throughput.
E. It is unable to provide antivirus protection
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two methods are available to add a new root certificate?___
A. Use sCep
B. Install from SFTP server
C. Install from a file
D. Use Https
E. Use LDAP
【多选题】
Which two are considered basic security principles?___
A. Accountability
B. Redundancy
C. High Availabilit
D. Integrity
E. Confidentiality
【多选题】
Which two roles of the Cisco WSA are true?___
A. IPS
B. firewall
C. antispam
D. web proxy
E. URL filter
【单选题】
Which next-generation encryption algorithm supports four variants?___
A. SHA-2
B. SHA-1
C. MD5
D. HMAC
【单选题】
What aims to remove the abil ity to deny an action?___
A. Non-Repudiation
B. Accountability
C. Integrity
D. Deniability
【单选题】
Which statements about the native VLAN is true ?___
A. It is susceptible to VLAN hopping attacks.
B. It is the Cisco recommended VLAN for switch-management traffic
C. It is most secure when it is a ssigned to vLAn 1.
D. It is the cisco-recomme nded vlan for user traffic
【单选题】
There are two versions of IKE:IKEv1 and IKEv2. Both IKEv1 and IKEv2 protocols operate in phases IKEv1 operates in two phases. IKEv2 operates in how many phases?___
【单选题】
What does the dh group refer to?___
A. length of key for hashing C
B. length of key for encryption
C. tunnel lifetime key
D. length of key for key exchange
E. length of key for authentication
【单选题】
Which path do you follow to enable aaa through the SDM ?___
A. Configure Tasks > AAA
B. Configure > Addition Authentication > AAA
C. Configure > AAA
D. Configure > Additional Tasks > AAA
E. Configure Authentication > AAA
【单选题】
which technology cloud be used on top of an MPLS VPN to add confidentiality ?___
A. IPsec
B. 3DES
C. AES
D. SSL
【单选题】
Which term is most closely aligned with the basic purpose of a SIEM solution? ___
A. Non-Repudiation
B. Accountability
C. Causality
D. Repudiation
【单选题】
You have just deployed SNMPv3 in your environment, Your manager asks you to make sure that our SNMP agents can only talk to the SNMP Manager. What would you configure on your SNMI agents to satisfy this request?___
A. A SNMP View containing the SNMP managers
B. Routing Filter with the SNMP managers in it applied outbound
C. A standard ACL containing the SNMP managers applied to the SNMP configuration
D. A SNMP Group containing the SNMP managers
【单选题】
Which feature prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port?___
A. BPDU filte
B. DHCP snooping
C. BPDU guard
D. Port Fast
【单选题】
Which command enables port security to use sticky MAC addresses on a switch?___
A. switchport port-security violation restrict
B. switchport port-security mac-address sticky
C. switchport port-security violation protect
D. switchport port-security
【单选题】
When you edit an IPS subsignature, what is the effect on the parent signature and the family of subsignatures?___
A. The change applies to the parent signature and the entire family of subsignatures
B. The change applies to the parent signature and the subsignature that you edit
C. The change applies only to subsignatures that are numbered sequentially after the subsignature that you edit
D. Other signatures are unaffected, the change applies only to the subsignature that you dit
【单选题】
Which type of mechanism does Cisco FirePOWER de ploy to protect ag detected moving across other networks?___
A. antivirus scanning
B. policy-based
C. reputation-based
D. signature-based
【单选题】
What action must you take on the ise to blacklist a wired device?___
A. Locate the switch through which the device is connected and push an a cl restricting all access by the device
B. Issue a CoA request for the de vice's mac address to each access switch in the network
C. Revoke the device's certificate so it is unable to authenticate to the network
D. Add the device's MAc address to a list of black listed devices
【单选题】
Which type of firewall can perform deep packet inspection?___
A. packet-filtering firewall
B. stateless firewall
C. application firewall
D. personal firewall
【单选题】
What is the main purpose of Control Plane Policing?___
A. to prevent exhaustion of route-proce ssor resources
B. to organize the egress packet queues
C. to define traffic classes
D. to maintain the policy map
【单选题】
Which attack can be prevented by OSPF authentication?___
A. smurf attack
B. IP spoofing attack
C. denial of service attack
D. buffer overflow attack